default search action
ACM Queue, Volume 10
Volume 10, Number 1, January 2012
- George V. Neville-Neil:
The Network Protocol Battle: A tale of hubris and zealotry. 10
- Patrice Godefroid, Michael Y. Levin, David A. Molnar:
SAGE: Whitebox Fuzzing for Security Testing. 20 - Luigi Rizzo:
Revisiting Network I/O APIs: The netmap Framework. 30
- Poul-Henning Kamp:
The Hyperdimensional Tar Pit. 40
Volume 10, Number 2, February 2012
- Jim Gettys:
Home Bufferbloat Demonstration Videos. 10
Volume 10, Number 3, March 2012
- Eric Allman:
Managing Technical Debt. 10 - Erik Meijer:
Your Mouse is a Database. 20
Volume 10, Number 4, April 2012
- Andrew Danowitz, Kyle Kelley, James Mao, John P. Stevenson, Mark Horowitz:
CPU DB: Recording Microprocessor History. 10
- George V. Neville-Neil:
A System is not a Product. 20
- Pat Helland:
Idempotence Is Not a Medical Condition. 30 - Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov:
Realtime Computer Vision with OpenCV. 40
Volume 10, Number 5, May 2012
- Dennis Abts, Bob Felderman:
A Guided Tour through Data-center Networking. 10 - Kathleen M. Nichols, Van Jacobson:
Controlling Queue Delay. 20
Volume 10, Number 6, June 2012
- George V. Neville-Neil:
A Nice Piece of Code. 10
- Poul-Henning Kamp:
LinkedIn Password Leak: Salt Their Hide. 20
- Rafael Vanoni Polanczyk:
Extending the Semantics of Scheduling Priorities. 30 - Thomas A. Limoncelli:
OpenFlow: A Radical New Idea in Networking. 40
Volume 10, Number 7, July 2012
- Manuel Serrano, Gérard Berry:
Multitier Programming in Hop. 10 - David Chisnall:
A New Objective-C Runtime: from Research to Production. 20 - Emery D. Berger:
Software Needs Seatbelts and Airbags. 30 - Erik Meijer:
All Your Database Are Belong to Us. 40
Volume 10, Number 8, August 2012
- George V. Neville-Neil:
Can More Code Mean Fewer Bugs? 10
- Poul-Henning Kamp:
A Generation Lost in the Bazaar. 20
Volume 10, Number 9, September 2012
- Marshall K. McKusick:
Disks from the Perspective of a File System. 10
- Jesse Robbins, Kripa Krishnan, John Allspaw, Thomas A. Limoncelli:
Resilience Engineering: Learning to Embrace Failure. 20
- Kripa Krishnan:
Weathering the Unexpected. 30
Volume 10, Number 10, October 2012
- Aiman Erbad, Charles Krasic:
Sender-side Buffers and the Case for Multimedia Adaptation. 10
- Queue Portrait: Robert Watson. 20
Volume 10, Number 11, November 2012
- Jeremiah Grossman:
The Web Won't Be Safe or Secure until We Break It. 10 - Pat Helland:
Condos and Clouds. 20
- Jeremiah Grossman, Ben Livshits, Rebecca Gurley Bace, George V. Neville-Neil:
Browser Security Case Study: Appearances Can Be Deceiving. 30
Volume 10, Number 12, December 2012
- Node Summit: The Importance of Cross Platform. 10
- Node Summit: The Evolution of Javascript. 20
- George V. Neville-Neil:
Code Abuse. 30
- Brendan Gregg:
Thinking Methodically about Performance. 40
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.